General

  • Target

    47f7c807a9b4a9ef24f25901a0975d96c298ec6c61bf13daa3f1fbdf5c5b85d3

  • Size

    1.3MB

  • MD5

    66f4501d4caf1b4e9148a9e6d49efb20

  • SHA1

    7dfed014b673b8aa197cf67d6b49ae1cd5240555

  • SHA256

    47f7c807a9b4a9ef24f25901a0975d96c298ec6c61bf13daa3f1fbdf5c5b85d3

  • SHA512

    d3b04f26ae169ed2f65e9942be4872eb1942141054ec5127cb1b0125af4d0e23d04bdfdabb6624f6f34de4134e990ba6a134ab8dfcd07ed126a1d23f4d61ad94

  • SSDEEP

    24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

Score
10/10

Malware Config

Signatures

  • DCRat payload 1 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Dcrat family

Files

  • 47f7c807a9b4a9ef24f25901a0975d96c298ec6c61bf13daa3f1fbdf5c5b85d3
    .exe windows x86

    fcf1390e9ce472c7270447fc5c61a0c1


    Headers

    Imports

    Sections